Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow

نویسندگان

  • Lenin Singaravelu
  • Bernhard Kauer
  • Alexander Boettcher
  • Hermann Härtig
  • Calton Pu
  • Gueyoung Jung
  • Carsten Weinhold
چکیده

Current client-server applications such as online banking employ the same client-side software stack to handle information with differing security and functionality requirements, thereby increasing the size and complexity of software that needs to be trusted. While the high complexity of existing software is a significant hindrance to testing and analysis, existing software and interfaces are too widely used to be entirely abandoned. We present a proxy-based approach called FlowGuard to address the problem of large and complex client-side software stacks. FlowGuard’s proxy employs mappings from sensitiveness of information to trustworthiness of software stacks to demultiplex incoming messages amongst multiple client-side software stacks. One of these stacks is a fully-functional legacy software stack and another is a small and simple stack designed to handle sensitive information. In contrast to previous approaches, FlowGuard not only reduces the complexity of software handling sensitive information but also minimizes modifications to legacy software stacks. By allowing users and service providers to define the mappings, FlowGuard also provides flexibility in determining functionality-security tradeoffs. We demonstrate the feasibility of our approach by implementing a FlowGuard, called BLAC, for https-based applications. BLAC relies on text patterns to identify sensitive information in HTTP responses and redirects such responses to a small and simple TrustedViewer, with an unmodified legacy software stack handling the rest of the responses. We developed a prototype implementation that works with a prominent bank’s online banking site. Our evaluation shows that BLAC reduces size and complexity of software that needs to be trusted by an order of magnitude, with a manageable overhead of few tens of milliseconds per HTTP response.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing secure information flow in client-side Web applications. (Vers l'établissement du flux d'information sûr dans les applications Web côté client)

During the last decade, Web applications have evolved from static pages presented by Web servers which centralised all computations to multi-tier applications in which computations are shared between the client and the server. In addition to this, current client-side Web applications often combine code dynamically loaded from different origins to create new functionalities. As it happens, this ...

متن کامل

Fission: Secure Dynamic Code-Splitting for JavaScript

Traditional web programming involves the creation of two distinct programs: a client-side frontend, a server-side back-end, and a lot of communications boilerplate. An alternative approach is to use a tierless programming model, where a single program describes the behavior of both the client and the server, and the runtime system takes care of communication. Unfortunately, this usually entails...

متن کامل

JSON and its use in Semantic Web

The semantic web has evolved over the current web and aims to provide a web that allows for easy retrieval and accessing of information by both man and machine. It provides for a wide variety of technology stacks , language standards and software components which help both man and machine to access data easily. Intelligent information retrieval and the credibility of data is managed in semantic...

متن کامل

A Client-Side Business Model for Electronic Privacy

Strengthening the user perception of privacy and trust on the Internet will require userfocused technological approaches, enforceable privacy laws, and business interventions. We propose a novel user-focused business model for privacy with a supporting client-side e-privacy architecture. The e-privacy business model is detailed in terms of target markets and stakeholders, value or revenue model...

متن کامل

Usage Control: A Vision for Next Generation Access Control

Protection Objectives Sensitive information protection IPR protection Privacy protection Protection Architectures Server-side reference monitor Client-side reference monitor SRM & CRM Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) Traditional Access Control Trust Management Usage Control Sensitive Information Protection Intellectual Property Rights Protection Privacy Pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007